Solved

Does config DB get restored

Posted on 2011-03-09
2
378 Views
Last Modified: 2012-05-11
Situation:

Server 1 (Test Environment)
W2K3
SQL Server 2000
WSS 3.0

Server 2 (Production)
W2k8
SQL Server 2000
WSS 3.0

I will be doing the following:
1) Backup(SQL 2000) of Content DB (content.db) to SERVER2
2) Restore(SQL2005) of content.db to SERVER2
3) Create a new Web Application (spwebapp)
4) Attach the content.db to the (spwebapp)

Questions:

1) Will I need to also restore the Config DB or just the content DB
2 ) Does it matter if I restore to SQL 2005? Since the backup is from SQL Server 2000.

Thanks
0
Comment
Question by:fstinc
2 Comments
 
LVL 14

Accepted Solution

by:
KoenVosters earned 250 total points
ID: 35085571
1. You do not need to restore the config DB.
2. You should restore it to 2000 under a different name, detach it, move it to sql 2005, give it it's original name and attach it to sql 2005
0
 

Author Comment

by:fstinc
ID: 35085609
Clear and straight forward. Thanks man.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sql query 107 59
converting visio 2010 to powerpoint 2010  - formatting issues 5 68
SharePoint Online Collect Data in an Email 1 24
IIS 8.5 WebDav Shared Handler Mappings 6 26
If you are a web developer, you would be aware of the <iframe> tag in HTML. The <iframe> stands for inline frame and is used to embed another document within the current HTML document. The embedded document could be even another website.
Preparing an email is something we should all take special care with – especially when the email is for somebody you may not know very well. The pressures of everyday working life stacked with a hectic office environment can make this a real challen…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now